Abstract
We show an architecture to automatically generate cryptographic keys using the FingerCode as defined by Jain et al. [4]. The FingerCode is obtained from gray scale fingerprint images. The architecture uses a classifier to compensate for the natural variability on the FingerCodes. In a training step the FingerCodes of the fingerprint samples for registered users are obtained; then random binary codes are assigned to each set of FingerCodes from the same finger, and finally an array of Support Vector Machines (SVM) is trained to associate the FingerCodes to their assigned random binary key. Each SVM is independent and assigns one bit, allowing the construction of binary keys of arbitrary length by adding and training more SVMs. To test the system, different set of fingerprint images from the same fingers used on the training step were used. The FingerCodes were calculated used as input to the SVM array to generate the assigned keys. Experimental results obtained using fingerprints selected from the FVC2000 and FVC2002 databases show results up to 90% performance on generating valid keys.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jain, A.K., Bolle, R., Pankanti, S.: Biometric Personal Identification in Networked Society. Kluwer Academic Publishers, Boston (1999)
Jain, A.K., Hong, L., Bolle, R.: On-line Fingerprint Verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 19(4), 302–314 (1997)
Jain, A.K., Ross, A., Prabhakar, S.: Fingerprint matching using minutiae and texture features. In: Proc. Int. Conference on Image Processing, vol. 3, pp. 282–285 (2001)
Jain, A.K., Prabhakar, S., Hong, L., Pankanti, S.: FingerCode: Filterbank-Based Fingerprint Matching. IEEE Trans. on Image Processing 9(5), 846–859 (2000)
Boser, B., Guyon, I., Vapnik, V.: A training algorithm for optimal margin classifiers. In: Proceedings of the Fifth Annual Workshop on Computational Learning Theory (1992)
Stojanov, R., Gilroy Soutar, G., Roberge, D., Kumar, V.: Biometric encryption using image processing, SPIE. Optical Security and Counterfeit Deterrence Techniques H. 3314, 178–188 (1998)
Cortes, C., Vapnik, V.: Support-vector network. Machine Learning 20, 273–297 (1995)
Furui, S.: Digital Speech Processing, Synthesis, and Recognition. Mercel Dekker, inc, New York (2001)
Garcia-Perera, L.P., Nolazco-Flores, J.A., Mex-Perera, C.: Phoneme Spotting for Speech-Based Cryto-key Generation. In: Sanfeliu, A., Cortés, M.L. (eds.) CIARP 2005. LNCS, vol. 3773, pp. 770–777. Springer, Heidelberg (2005)
Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Cryptographic Key Generation From Voice. In: Proceedings of the IEEE Conference on Security and Privacy, Oakland, CA (2001)
Osuna, E., Freund, R., Girosi, F.: Support vector machines: Training and applications. Technical Report AIM-1602, MIT A.I. Lab. (1996)
Osuna, E., Freund, R., Girosi, F.: Training Support Vector Machines: An Application to Face Recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 130–136 (1997)
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6) (2004)
Joachims, T.: SVMLight: Support Vector Machine, SVM-Light Support Vector Machine, University of Dortmund (1999), http://svmlight.joachims.org/
Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, New York (2003)
Soutar, C., Roberge, D., Stojanov, S.A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric Cryptosystem: Biometric encryption using image processing. In: Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, pp. 178–188 (1998)
Clancy, T.C., Kiyavash, N., Lin, D.J.: Biometric Cryptosystem: Secure smartcard-based fingerprint authentication. In: Proc. ACM SIGMM 2003 Multimedia, Biometrics Methods and Aplications Workshop, pp. 45–52 (2003)
Wan, V., Renals, S.: Speaker Verification Using Sequence Discriminant Support Vector Machines. IEEE Transactions on speech and audio processing 13(2) (March 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ramírez-Ruiz, J.A., Pfeiffer, C.F., Nolazco-Flores, J.A. (2006). Cryptographic Keys Generation Using FingerCodes. In: Sichman, J.S., Coelho, H., Rezende, S.O. (eds) Advances in Artificial Intelligence - IBERAMIA-SBIA 2006. IBERAMIA SBIA 2006 2006. Lecture Notes in Computer Science(), vol 4140. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11874850_22
Download citation
DOI: https://doi.org/10.1007/11874850_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-45462-5
Online ISBN: 978-3-540-45464-9
eBook Packages: Computer ScienceComputer Science (R0)